Solved

Somehow scan comment card results into Access database

Posted on 2014-11-19
6
197 Views
Last Modified: 2014-11-20
We have a comments card form that is printed and filled out by users manually.  Is it possible to scan these comments cards and somehow have the data entered into a table in an Access database?

--Steve
0
Comment
Question by:SteveL13
  • 3
  • 2
6 Comments
 

Author Comment

by:SteveL13
ID: 40453477
I probably didn't explain this one well enough.  We don't want to store the scanned images in the database.  But we do want field data to be scanned and somehow entered into the database.
0
 
LVL 84

Assisted Solution

by:Scott McDaniel (Microsoft Access MVP - EE MVE )
Scott McDaniel (Microsoft Access MVP - EE MVE ) earned 167 total points
ID: 40453967
You're looking for OCR (Optical Character Recognition) - and good luck getting something like that to interact with Access.

Access 2003 included the Microsoft Office Document Interface, but I don't know if it was included in later versions. Even at that, trying to extract handwritten content to data fields would be an exercise in futility, at best.

You might try this, if you can get hold of the necessary libraries:
http://msdn.microsoft.com/en-us/library/office/aa167607(v=office.11).aspx

Or perhaps a commercial. There's lots of stuff here: http://www.scanstore.com/Scanning/Document_Imaging/Software/OCR_Software/activex_ocr.asp

And to answer the inevitable: No, you cannot do this strictly with VBA.
0
 
LVL 49

Assisted Solution

by:Gustav Brock
Gustav Brock earned 333 total points
ID: 40454489
You can buy one the IRIScan scanners:

http://www.irislink.com/c2-2439-189/IRIScan---Mobile-scanners---Portable---Office-scanning-devices.aspx

The deal is, that they come bundled with "Readiris Pro 14" which is a very capable piece of OCR software.
It can save the extracted text to a multitude of file formats, for example .csv which you can link directly in Access.

/gustav
0
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

 

Author Comment

by:SteveL13
ID: 40455784
Unfortunately the information on the cards is handwritten.  This includes checkboxes that are "X'd" and a name that is handwritten.

I have a feeling this is not going to work.  

Thoughts?
0
 
LVL 49

Accepted Solution

by:
Gustav Brock earned 333 total points
ID: 40456213
That will be extremely difficult. Look for handwriting recognision tools. But they all have to learn, so if different people did the writing you are in trouble.

/gustav
0
 

Author Comment

by:SteveL13
ID: 40456222
Thought so.  Thanks.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction When developing Access applications, often we need to know whether an object exists.  This article presents a quick and reliable routine to determine if an object exists without that object being opened. If you wanted to inspect/ite…
Introduction The Visual Basic for Applications (VBA) language is at the heart of every application that you write. It is your key to taking Access beyond the world of wizards into a world where anything is possible. This article introduces you to…
With Microsoft Access, learn how to specify relationships between tables and set various options on the relationship. Add the tables: Create the relationship: Decide if you’re going to set referential integrity: Decide if you want cascade upda…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question